Sciweavers

1050 search results - page 88 / 210
» A Trainable System for Object Detection
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 4 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
ICCS
2007
Springer
15 years 1 months ago
Unusual Event Recognition for Mobile Alarm System
This paper proposes an unusual event recognition algorithm, which is a part of a mobile alarm system. Our systems focus on unusual event. When the system detects the unusual event,...
Soo Yeong Kwak, Guntae Bae, Kil-Cheon Kim, Hyeran ...
ICAPR
2009
Springer
14 years 7 months ago
Online Improved Eigen Tracking
We present a novel predictive statistical framework to improve the performance of an Eigen Tracker which uses fast and efficient eigen space updates to learn new views of the obje...
Subarna Tripathi, Santanu Chaudhury, Sumantra Dutt...
MM
2006
ACM
330views Multimedia» more  MM 2006»
15 years 3 months ago
Visual attention detection in video sequences using spatiotemporal cues
Human vision system actively seeks interesting regions in images to reduce the search effort in tasks, such as object detection and recognition. Similarly, prominent actions in v...
Yun Zhai, Mubarak Shah
ISCI
2011
14 years 4 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni